Compare commits
No commits in common. "changed/a8/bind9.16-9.16.23-0.14.el8_8.1.alma" and "c8-beta" have entirely different histories.
changed/a8
...
c8-beta
|
@ -1,4 +1,4 @@
|
||||||
From f1d9e9ee3859976f403914d20ad2a10855343702 Mon Sep 17 00:00:00 2001
|
From ed920ea2ae1cc1214b42b82a5149758dbec941a5 Mon Sep 17 00:00:00 2001
|
||||||
From: =?UTF-8?q?Ond=C5=99ej=20Sur=C3=BD?= <ondrej@isc.org>
|
From: =?UTF-8?q?Ond=C5=99ej=20Sur=C3=BD?= <ondrej@isc.org>
|
||||||
Date: Tue, 30 May 2023 08:46:17 +0200
|
Date: Tue, 30 May 2023 08:46:17 +0200
|
||||||
Subject: [PATCH] Improve RBT overmem cache cleaning
|
Subject: [PATCH] Improve RBT overmem cache cleaning
|
||||||
|
@ -25,15 +25,17 @@ cache going over the configured memory limit (`max-cache-size`).
|
||||||
|
|
||||||
Additionally, refactor the overmem_purge() function to reduce for-loop
|
Additionally, refactor the overmem_purge() function to reduce for-loop
|
||||||
nesting for readability.
|
nesting for readability.
|
||||||
|
|
||||||
|
(cherry picked from commit f1d9e9ee3859976f403914d20ad2a10855343702)
|
||||||
---
|
---
|
||||||
lib/dns/rbtdb.c | 105 ++++++++++++++++++++++++++++++------------------
|
lib/dns/rbtdb.c | 105 ++++++++++++++++++++++++++++++------------------
|
||||||
1 file changed, 65 insertions(+), 40 deletions(-)
|
1 file changed, 65 insertions(+), 40 deletions(-)
|
||||||
|
|
||||||
diff --git a/lib/dns/rbtdb.c b/lib/dns/rbtdb.c
|
diff --git a/lib/dns/rbtdb.c b/lib/dns/rbtdb.c
|
||||||
index c32db44cad7..ee06c51e925 100644
|
index 51178cc877..75f97f5550 100644
|
||||||
--- a/lib/dns/rbtdb.c
|
--- a/lib/dns/rbtdb.c
|
||||||
+++ b/lib/dns/rbtdb.c
|
+++ b/lib/dns/rbtdb.c
|
||||||
@@ -605,7 +605,7 @@ static void
|
@@ -599,7 +599,7 @@ static void
|
||||||
expire_header(dns_rbtdb_t *rbtdb, rdatasetheader_t *header, bool tree_locked,
|
expire_header(dns_rbtdb_t *rbtdb, rdatasetheader_t *header, bool tree_locked,
|
||||||
expire_t reason);
|
expire_t reason);
|
||||||
static void
|
static void
|
||||||
|
@ -42,7 +44,7 @@ index c32db44cad7..ee06c51e925 100644
|
||||||
bool tree_locked);
|
bool tree_locked);
|
||||||
static isc_result_t
|
static isc_result_t
|
||||||
resign_insert(dns_rbtdb_t *rbtdb, int idx, rdatasetheader_t *newheader);
|
resign_insert(dns_rbtdb_t *rbtdb, int idx, rdatasetheader_t *newheader);
|
||||||
@@ -6823,6 +6823,16 @@ cleanup:
|
@@ -6802,6 +6802,16 @@ cleanup:
|
||||||
|
|
||||||
static dns_dbmethods_t zone_methods;
|
static dns_dbmethods_t zone_methods;
|
||||||
|
|
||||||
|
@ -59,7 +61,7 @@ index c32db44cad7..ee06c51e925 100644
|
||||||
static isc_result_t
|
static isc_result_t
|
||||||
addrdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
|
addrdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
|
||||||
isc_stdtime_t now, dns_rdataset_t *rdataset, unsigned int options,
|
isc_stdtime_t now, dns_rdataset_t *rdataset, unsigned int options,
|
||||||
@@ -6987,7 +6997,8 @@ addrdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
|
@@ -6965,7 +6975,8 @@ addrdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
|
||||||
}
|
}
|
||||||
|
|
||||||
if (cache_is_overmem) {
|
if (cache_is_overmem) {
|
||||||
|
@ -69,7 +71,7 @@ index c32db44cad7..ee06c51e925 100644
|
||||||
}
|
}
|
||||||
|
|
||||||
NODE_LOCK(&rbtdb->node_locks[rbtnode->locknum].lock,
|
NODE_LOCK(&rbtdb->node_locks[rbtnode->locknum].lock,
|
||||||
@@ -7006,10 +7017,18 @@ addrdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
|
@@ -6984,10 +6995,18 @@ addrdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
|
||||||
}
|
}
|
||||||
|
|
||||||
header = isc_heap_element(rbtdb->heaps[rbtnode->locknum], 1);
|
header = isc_heap_element(rbtdb->heaps[rbtnode->locknum], 1);
|
||||||
|
@ -92,7 +94,7 @@ index c32db44cad7..ee06c51e925 100644
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@@ -10547,52 +10566,58 @@ update_header(dns_rbtdb_t *rbtdb, rdatasetheader_t *header, isc_stdtime_t now) {
|
@@ -10531,52 +10550,58 @@ update_header(dns_rbtdb_t *rbtdb, rdatasetheader_t *header, isc_stdtime_t now) {
|
||||||
ISC_LIST_PREPEND(rbtdb->rdatasets[header->node->locknum], header, link);
|
ISC_LIST_PREPEND(rbtdb->rdatasets[header->node->locknum], header, link);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -186,5 +188,5 @@ index c32db44cad7..ee06c51e925 100644
|
||||||
NODE_UNLOCK(&rbtdb->node_locks[locknum].lock,
|
NODE_UNLOCK(&rbtdb->node_locks[locknum].lock,
|
||||||
isc_rwlocktype_write);
|
isc_rwlocktype_write);
|
||||||
--
|
--
|
||||||
GitLab
|
2.40.1
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,168 @@
|
||||||
|
From b137e12dc8118cddee20e372e480a495585e72b6 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Petr Mensik <pemensik@redhat.com>
|
||||||
|
Date: Tue, 19 Sep 2023 12:44:31 +0200
|
||||||
|
Subject: [PATCH] Fix CVE-2023-3341
|
||||||
|
|
||||||
|
6245. [security] Limit the amount of recursion that can be performed
|
||||||
|
by isccc_cc_fromwire. (CVE-2023-3341) [GL #4152]
|
||||||
|
---
|
||||||
|
lib/isccc/cc.c | 39 ++++++++++++++++++++++++--------
|
||||||
|
lib/isccc/include/isccc/result.h | 4 +++-
|
||||||
|
lib/isccc/result.c | 4 +++-
|
||||||
|
3 files changed, 35 insertions(+), 12 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/lib/isccc/cc.c b/lib/isccc/cc.c
|
||||||
|
index 0be28b9057..3744d0f037 100644
|
||||||
|
--- a/lib/isccc/cc.c
|
||||||
|
+++ b/lib/isccc/cc.c
|
||||||
|
@@ -50,6 +50,10 @@
|
||||||
|
|
||||||
|
#define MAX_TAGS 256
|
||||||
|
#define DUP_LIFETIME 900
|
||||||
|
+#ifndef ISCCC_MAXDEPTH
|
||||||
|
+#define ISCCC_MAXDEPTH \
|
||||||
|
+ 10 /* Big enough for rndc which just sends a string each way. */
|
||||||
|
+#endif
|
||||||
|
|
||||||
|
typedef isccc_sexpr_t *sexpr_ptr;
|
||||||
|
|
||||||
|
@@ -480,19 +484,25 @@ verify(isccc_sexpr_t *alist, unsigned char *data, unsigned int length,
|
||||||
|
|
||||||
|
static isc_result_t
|
||||||
|
table_fromwire(isccc_region_t *source, isccc_region_t *secret,
|
||||||
|
- uint32_t algorithm, isccc_sexpr_t **alistp);
|
||||||
|
+ uint32_t algorithm, unsigned int depth, isccc_sexpr_t **alistp);
|
||||||
|
|
||||||
|
static isc_result_t
|
||||||
|
-list_fromwire(isccc_region_t *source, isccc_sexpr_t **listp);
|
||||||
|
+list_fromwire(isccc_region_t *source, unsigned int depth,
|
||||||
|
+ isccc_sexpr_t **listp);
|
||||||
|
|
||||||
|
static isc_result_t
|
||||||
|
-value_fromwire(isccc_region_t *source, isccc_sexpr_t **valuep) {
|
||||||
|
+value_fromwire(isccc_region_t *source, unsigned int depth,
|
||||||
|
+ isccc_sexpr_t **valuep) {
|
||||||
|
unsigned int msgtype;
|
||||||
|
uint32_t len;
|
||||||
|
isccc_sexpr_t *value;
|
||||||
|
isccc_region_t active;
|
||||||
|
isc_result_t result;
|
||||||
|
|
||||||
|
+ if (depth > ISCCC_MAXDEPTH) {
|
||||||
|
+ return (ISCCC_R_MAXDEPTH);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
if (REGION_SIZE(*source) < 1 + 4) {
|
||||||
|
return (ISC_R_UNEXPECTEDEND);
|
||||||
|
}
|
||||||
|
@@ -513,9 +523,9 @@ value_fromwire(isccc_region_t *source, isccc_sexpr_t **valuep) {
|
||||||
|
result = ISC_R_NOMEMORY;
|
||||||
|
}
|
||||||
|
} else if (msgtype == ISCCC_CCMSGTYPE_TABLE) {
|
||||||
|
- result = table_fromwire(&active, NULL, 0, valuep);
|
||||||
|
+ result = table_fromwire(&active, NULL, 0, depth + 1, valuep);
|
||||||
|
} else if (msgtype == ISCCC_CCMSGTYPE_LIST) {
|
||||||
|
- result = list_fromwire(&active, valuep);
|
||||||
|
+ result = list_fromwire(&active, depth + 1, valuep);
|
||||||
|
} else {
|
||||||
|
result = ISCCC_R_SYNTAX;
|
||||||
|
}
|
||||||
|
@@ -525,7 +535,7 @@ value_fromwire(isccc_region_t *source, isccc_sexpr_t **valuep) {
|
||||||
|
|
||||||
|
static isc_result_t
|
||||||
|
table_fromwire(isccc_region_t *source, isccc_region_t *secret,
|
||||||
|
- uint32_t algorithm, isccc_sexpr_t **alistp) {
|
||||||
|
+ uint32_t algorithm, unsigned int depth, isccc_sexpr_t **alistp) {
|
||||||
|
char key[256];
|
||||||
|
uint32_t len;
|
||||||
|
isc_result_t result;
|
||||||
|
@@ -535,6 +545,10 @@ table_fromwire(isccc_region_t *source, isccc_region_t *secret,
|
||||||
|
|
||||||
|
REQUIRE(alistp != NULL && *alistp == NULL);
|
||||||
|
|
||||||
|
+ if (depth > ISCCC_MAXDEPTH) {
|
||||||
|
+ return (ISCCC_R_MAXDEPTH);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
checksum_rstart = NULL;
|
||||||
|
first_tag = true;
|
||||||
|
alist = isccc_alist_create();
|
||||||
|
@@ -551,7 +565,7 @@ table_fromwire(isccc_region_t *source, isccc_region_t *secret,
|
||||||
|
GET_MEM(key, len, source->rstart);
|
||||||
|
key[len] = '\0'; /* Ensure NUL termination. */
|
||||||
|
value = NULL;
|
||||||
|
- result = value_fromwire(source, &value);
|
||||||
|
+ result = value_fromwire(source, depth + 1, &value);
|
||||||
|
if (result != ISC_R_SUCCESS) {
|
||||||
|
goto bad;
|
||||||
|
}
|
||||||
|
@@ -589,14 +603,19 @@ bad:
|
||||||
|
}
|
||||||
|
|
||||||
|
static isc_result_t
|
||||||
|
-list_fromwire(isccc_region_t *source, isccc_sexpr_t **listp) {
|
||||||
|
+list_fromwire(isccc_region_t *source, unsigned int depth,
|
||||||
|
+ isccc_sexpr_t **listp) {
|
||||||
|
isccc_sexpr_t *list, *value;
|
||||||
|
isc_result_t result;
|
||||||
|
|
||||||
|
+ if (depth > ISCCC_MAXDEPTH) {
|
||||||
|
+ return (ISCCC_R_MAXDEPTH);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
list = NULL;
|
||||||
|
while (!REGION_EMPTY(*source)) {
|
||||||
|
value = NULL;
|
||||||
|
- result = value_fromwire(source, &value);
|
||||||
|
+ result = value_fromwire(source, depth + 1, &value);
|
||||||
|
if (result != ISC_R_SUCCESS) {
|
||||||
|
isccc_sexpr_free(&list);
|
||||||
|
return (result);
|
||||||
|
@@ -628,7 +647,7 @@ isccc_cc_fromwire(isccc_region_t *source, isccc_sexpr_t **alistp,
|
||||||
|
return (ISCCC_R_UNKNOWNVERSION);
|
||||||
|
}
|
||||||
|
|
||||||
|
- return (table_fromwire(source, secret, algorithm, alistp));
|
||||||
|
+ return (table_fromwire(source, secret, algorithm, 0, alistp));
|
||||||
|
}
|
||||||
|
|
||||||
|
static isc_result_t
|
||||||
|
diff --git a/lib/isccc/include/isccc/result.h b/lib/isccc/include/isccc/result.h
|
||||||
|
index 5346babefc..5b6a876d1c 100644
|
||||||
|
--- a/lib/isccc/include/isccc/result.h
|
||||||
|
+++ b/lib/isccc/include/isccc/result.h
|
||||||
|
@@ -46,8 +46,10 @@
|
||||||
|
#define ISCCC_R_CLOCKSKEW (ISC_RESULTCLASS_ISCCC + 4)
|
||||||
|
/*% Duplicate */
|
||||||
|
#define ISCCC_R_DUPLICATE (ISC_RESULTCLASS_ISCCC + 5)
|
||||||
|
+/*% Maximum recursion depth */
|
||||||
|
+#define ISCCC_R_MAXDEPTH (ISC_RESULTCLASS_ISCCC + 6)
|
||||||
|
|
||||||
|
-#define ISCCC_R_NRESULTS 6 /*%< Number of results */
|
||||||
|
+#define ISCCC_R_NRESULTS 7 /*%< Number of results */
|
||||||
|
|
||||||
|
ISC_LANG_BEGINDECLS
|
||||||
|
|
||||||
|
diff --git a/lib/isccc/result.c b/lib/isccc/result.c
|
||||||
|
index 9285435209..1956cb1655 100644
|
||||||
|
--- a/lib/isccc/result.c
|
||||||
|
+++ b/lib/isccc/result.c
|
||||||
|
@@ -36,12 +36,14 @@ static const char *text[ISCCC_R_NRESULTS] = {
|
||||||
|
"bad auth", /* 3 */
|
||||||
|
"expired", /* 4 */
|
||||||
|
"clock skew", /* 5 */
|
||||||
|
- "duplicate" /* 6 */
|
||||||
|
+ "duplicate", /* 6 */
|
||||||
|
+ "max depth" /* 7 */
|
||||||
|
};
|
||||||
|
|
||||||
|
static const char *ids[ISCCC_R_NRESULTS] = {
|
||||||
|
"ISCCC_R_UNKNOWNVERSION", "ISCCC_R_SYNTAX", "ISCCC_R_BADAUTH",
|
||||||
|
"ISCCC_R_EXPIRED", "ISCCC_R_CLOCKSKEW", "ISCCC_R_DUPLICATE",
|
||||||
|
+ "ISCCC_R_MAXDEPTH"
|
||||||
|
};
|
||||||
|
|
||||||
|
#define ISCCC_RESULT_RESULTSET 2
|
||||||
|
--
|
||||||
|
2.41.0
|
||||||
|
|
|
@ -57,7 +57,7 @@ Summary: The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) serv
|
||||||
Name: bind9.16
|
Name: bind9.16
|
||||||
License: MPLv2.0
|
License: MPLv2.0
|
||||||
Version: 9.16.23
|
Version: 9.16.23
|
||||||
Release: 0.14%{?dist}.1.alma
|
Release: 0.16%{?dist}
|
||||||
Epoch: 32
|
Epoch: 32
|
||||||
Url: https://www.isc.org/downloads/bind/
|
Url: https://www.isc.org/downloads/bind/
|
||||||
#
|
#
|
||||||
|
@ -126,9 +126,9 @@ Patch185: bind-9.16-CVE-2022-3094-test.patch
|
||||||
Patch186: bind-9.16-CVE-2022-3736.patch
|
Patch186: bind-9.16-CVE-2022-3736.patch
|
||||||
# https://gitlab.isc.org/isc-projects/bind9/commit/b4a65aaea19762a3712932aa2270e8a833fbde22
|
# https://gitlab.isc.org/isc-projects/bind9/commit/b4a65aaea19762a3712932aa2270e8a833fbde22
|
||||||
Patch187: bind-9.16-CVE-2022-3924.patch
|
Patch187: bind-9.16-CVE-2022-3924.patch
|
||||||
# Patch is taken from bind upstream gitlab and updated to apply correctly:
|
|
||||||
# https://gitlab.isc.org/isc-projects/bind9/commit/f1d9e9ee3859976f403914d20ad2a10855343702
|
# https://gitlab.isc.org/isc-projects/bind9/commit/f1d9e9ee3859976f403914d20ad2a10855343702
|
||||||
Patch188: bind-9.16-CVE-2023-2828.patch
|
Patch188: bind-9.16-CVE-2023-2828.patch
|
||||||
|
Patch189: bind-9.16-CVE-2023-3341.patch
|
||||||
|
|
||||||
%{?systemd_ordering}
|
%{?systemd_ordering}
|
||||||
Requires: coreutils
|
Requires: coreutils
|
||||||
|
@ -441,6 +441,7 @@ in HTML and PDF format.
|
||||||
%patch186 -p1 -b .CVE-2022-3736
|
%patch186 -p1 -b .CVE-2022-3736
|
||||||
%patch187 -p1 -b .CVE-2022-3924
|
%patch187 -p1 -b .CVE-2022-3924
|
||||||
%patch188 -p1 -b .CVE-2023-2828
|
%patch188 -p1 -b .CVE-2023-2828
|
||||||
|
%patch189 -p1 -b .CVE-2023-3341
|
||||||
|
|
||||||
%if %{with PKCS11}
|
%if %{with PKCS11}
|
||||||
%patch135 -p1 -b .config-pkcs11
|
%patch135 -p1 -b .config-pkcs11
|
||||||
|
@ -1160,8 +1161,12 @@ fi;
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
* Mon Jul 17 2023 Andrew Lukoshko <alukoshko@almalinux.org> - 32:9.16.23-0.14.1.alma
|
* Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.16
|
||||||
- Improve RBT overmem cache cleaning (CVE-2023-2828)
|
- Limit the amount of recursion possible in control channel (CVE-2023-3341)
|
||||||
|
|
||||||
|
* Tue Jun 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.15
|
||||||
|
- Strengten cache cleaning to prevent overflowing configured limit
|
||||||
|
(CVE-2023-2828)
|
||||||
|
|
||||||
* Sat Feb 25 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.14
|
* Sat Feb 25 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.14
|
||||||
- Handle subtle difference between upstream and rhel (CVE-2022-3094)
|
- Handle subtle difference between upstream and rhel (CVE-2022-3094)
|
||||||
|
|
Loading…
Reference in New Issue